General

  • Target

    da56c10f40021a4207be6348e853bd8fdf00e9b0a3d12c5f15acc02f4c450cda

  • Size

    1.3MB

  • MD5

    f4ab3f8180d3a51da8a4d4eb40286f7b

  • SHA1

    3bd4afd466003caa935b4b656794e4c5c8cd6e07

  • SHA256

    da56c10f40021a4207be6348e853bd8fdf00e9b0a3d12c5f15acc02f4c450cda

  • SHA512

    ebcb73579133637f91e344dd3ca89e771628c1e354f57141d37ddf273c1ce9a76e52253eafbf481fa2b1a04da7e911a57135ff0e12c1883d1bbe8af8d03ef6a7

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • da56c10f40021a4207be6348e853bd8fdf00e9b0a3d12c5f15acc02f4c450cda
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections